User:Keshab: Difference between revisions

Jump to navigation Jump to search
1,000 bytes added ,  27 November 2023
Line 5: Line 5:
Class: VIII
Class: VIII


== '''Specific objectives''' ==
=== '''Specific objectives''' ===
To learn the concept of cyber crime, its impact and basic cybersecurity practice.
To learn the concept of cyber crime, its impact and basic cybersecurity practice.


== '''Teaching aids''' ==
=== '''Teaching aids''' ===
White board and Markers
White board and Markers


Computer and Internet.
Computer and Internet.


== '''Introduction (3 minutes)''' ==
=== '''Introduction (3 minutes)''' ===
Define cybercrime and its forms.
Define cybercrime and its forms.


Discuss the importance of cybersecurity.
Discuss the importance of cybersecurity.


== '''Types of cyber crime(3 minutes)''' ==
=== '''Types of cyber crime(3 minutes)''' ===
Explain Phishing malware and hacking.
Explain Phishing malware and hacking.


== '''Cybersecurity Basics''' ==
=== '''Cybersecurity Basics (3 Minutes)''' ===
Emphasize the importance of strong password and multi factor authentication


Password hygiene software updates and safe browsing
Advocate for regular software updates
 
Educate about safe browsing and recognize the potential risk.
 
=== '''Case study (2 minutes)''' ===
Examine Real life cyber crime cases and foster discussion on how these incidents could have been avoided with proper cybersecurity measures.
 
=== '''Cybersecurity tools (2 Minutes)''' ===
Explore Antivirus software firewall
 
Encourage students to understand the purpose and functionality of these tools in protecting digital assets.
 
=== '''Group activity(5 Minutes)''' ===
Assign Scenarios related to cybersecurity issues for analysis
 
Encourage collaborative problem solving and propose preventive measure
 
=== '''Discussion and Q&A(5 Minutes)''' ===
Conduct a comprehensive class discussion on group activities
 
Address any questions or concerns regarding cybercrime or cybersecurity.
 
=== '''Assignments''' ===
Assign a research task on emerging cybersecurity threats or innovative technologies in the field.
141

edits

Navigation menu